WND

Iranian terrorists hacking phones worldwide

Hezbollah stole personal data, controlled cameras to spy

Art Moore, co-author of the best-selling book "See Something, Say Nothing," entered the media world as a PR assistant for the Seattle Mariners and a correspondent covering pro and college sports for Associated Press Radio. He reported for a Chicago-area daily newspaper and was senior news writer for Christianity Today magazine and an editor for Worldwide Newsroom before joining WND shortly after 9/11. He earned a master's degree in communications from Wheaton College.

Installing the application gave the hackers access to sensitive information such as GPS data, photographs, contacts and communications.

The hackers could also secretly enable the recording function on a particular mobile device to spy on the target.

The Czech intelligence service said it cooperated with international partners to identify and disarm servers used in Hezbollah’s cyber espionage campaign.

Miroslav Mares, professor of international politics at Masrayk University, noted the Czech Republic has traditionally been regarded as an ally of Israel and the United States in actions to combat a growing cyber espionage effort by Hezbollah, which is on the European Union’s terrorist list.

IPT said the Palestinian terrorist group Hamas has used fake dating applications to seduce Israeli soldiers and install spyware on their phones.

Israel’s YNet News cited a senior Israeli intelligence official in July who disclosed that Israel “identified a similar method in the January 2017 when the IDF uncovered that a Gazan terrorist group lures soldiers by using fake women’s profiles before infecting their phones with spyware.”

Nitzan Ziv, vice president of Check Point Software Technologies, explained that the “minute the spy software is installed on a smartphone the attackers can hear everything that is going on in the room.”

Ziv said the hackers can have access “to each file downloaded on the phone, activate the phone’s camera and get the specific location of the phone.”